Talks & Publications



   Java Hurdling: Obstacles and Techniques in Java Client Penetration-testing   



   R U aBLE? BLE Application Hacking   


   Break-a-ble: Hacking Your Smartphone with BLE   


   Hacking Bluetooth Low Energy Based Applications   


   Hack-a-ble: Hacking BLE Smart Devices   


   An Active Man-in-th-Middle Attack on Smart Devices   


   Hacking Bluetooth Low Energy Based Applications



   Battle of the Smarts


   Does Serverless Means (mostly) Harmless?


   Your Apps Have Gone Serverless. Has Your Security?


   Your Apps Have Gone Serverless. Has Your Security?   


   Serverless Security: the untold story


   Serverless Security: New World. New War.


   Serverless Security: New World. New War.   



   Serverless Top 10 Vulnerabilities


   Serverless Security Top 10


   OWASP Serverless Top 10


   Damn Vulnerable Serverless Application (DVSA)


   Injections Without Borders: An anatomy of Serverless Event Injections


   Full Steam Ahead: Serverless Hacking 101


   OWASP Serverless Top 10


   Serverless Security Top 10 Risks


   BASC: OWASP Serverless Top 10


   OWASP Nashville: Serverless Security for Dummies


   Serverless DevSecOps: Owning Security


   Event Injections: Sending Evil to the Cloud



   Alexa, Hack my Server(less) Please